First published: Wed Aug 02 2023(Updated: )
procps-ng procps is vulnerable to a denial of service, caused by a heap based buffer overflow when running the “ps” utility. By sending a specially crafted request, a local authenticated attacker could exploit this vulnerability to cause a denial of service condition.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
Procps | >=3.3.0<=4.0.3 | |
Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4016 has a severity rating that indicates it can cause a denial of service due to a heap-based buffer overflow.
To fix CVE-2023-4016, update the affected software to a version that addresses the buffer overflow vulnerability.
CVE-2023-4016 affects the procps project, IBM Security Verify Governance, and Fedora 38 systems.
CVE-2023-4016 involves a local authenticated attacker exploiting a specially crafted request to trigger a denial of service.
CVE-2023-4016 can lead to a denial of service condition, rendering the affected systems temporarily inoperable.